Skip to main content
Top
Published in: Cluster Computing 4/2019

10-02-2018

Efficient group authentication in RFID using secret sharing scheme

Authors: Yanxiao Liu, Qindong Sun, Yichuan Wang, Lei Zhu, Wenjiang Ji

Published in: Cluster Computing | Special Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Radio frequency identification (RFID) systems become more popular in recent years due to its low cost and high efficiency in identification. Authentication between tags and server is a key technology to protect the security of RFID systems. Most previous authentication approaches adopt hash functions or public cryptography, they need multiple rounds of communications between tags and sever. In this paper, we use threshold secret sharing scheme to propose a novel group authentication method in RFID. In our scheme, a group of tags can be authenticated by the sever with only need one-round communication, and the sever can identify the unqualified tags using the approach of cheater identification in secret sharing. The proposed authentication has efficient computation which is fit for RFID. More importantly, it can greatly reduce the cost of communication and also the risk of been attacked through the communication channel.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Michahelles, F., Thiesse, F., Schmidt, A., Williams, J.R.: Pervasive RFID and near field communication technology. IEEE Pervasive Comput. 6(3), 94–96 (2007)CrossRef Michahelles, F., Thiesse, F., Schmidt, A., Williams, J.R.: Pervasive RFID and near field communication technology. IEEE Pervasive Comput. 6(3), 94–96 (2007)CrossRef
2.
go back to reference Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secur. Comput. 4(4), 337–340 (2007)CrossRef Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secur. Comput. 4(4), 337–340 (2007)CrossRef
3.
go back to reference Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. International Conference on Selected Areas in Cryptography, LNCS 3897, 291–306 (2005) Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. International Conference on Selected Areas in Cryptography, LNCS 3897, 291–306 (2005)
4.
go back to reference Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: CRYPTO2005, LNCS, vol. 3126, pp. 293–308. (2005) Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: CRYPTO2005, LNCS, vol. 3126, pp. 293–308. (2005)
5.
go back to reference Cao, T., Shen, P.: Cryptanalysis of some RFID authentication protocols. J. Commun. 3(7), 95–100 (2008)CrossRef Cao, T., Shen, P.: Cryptanalysis of some RFID authentication protocols. J. Commun. 3(7), 95–100 (2008)CrossRef
6.
go back to reference Juels, A.: Strengthening EPC tag against cloning. In: Acm Workshop on Wireless Security, pp. 67–76. (2005) Juels, A.: Strengthening EPC tag against cloning. In: Acm Workshop on Wireless Security, pp. 67–76. (2005)
7.
go back to reference Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Ecrypt Workshop on RFID and Lightweight Crypto. (2005) Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Ecrypt Workshop on RFID and Lightweight Crypto. (2005)
8.
go back to reference Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250–255 (2017) Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250–255 (2017)
9.
go back to reference Yeh, T.C., Wua, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3), 337–341 (2011)CrossRef Yeh, T.C., Wua, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3), 337–341 (2011)CrossRef
10.
go back to reference Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A. LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Workshop on RFID Security, p. 6. (2006) Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A. LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Workshop on RFID Security, p. 6. (2006)
11.
go back to reference Liu, Y.N., Cheng, C., Gu, T., Jiang, T., Li, X.: A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 16(3), 836–842 (2016)CrossRef Liu, Y.N., Cheng, C., Gu, T., Jiang, T., Li, X.: A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 16(3), 836–842 (2016)CrossRef
12.
go back to reference Li, T., Deng, R.H.: Vulnerability analysis of EMAP An efficient RFID mutual authentication protocol. In: International Conference on Availability, Reliability and Security, pp. 238–245. (2007) Li, T., Deng, R.H.: Vulnerability analysis of EMAP An efficient RFID mutual authentication protocol. In: International Conference on Availability, Reliability and Security, pp. 238–245. (2007)
13.
go back to reference Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67. (2005) Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67. (2005)
14.
go back to reference Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM Conference on Computer & Communications Security, pp. 210-219, (2004) Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM Conference on Computer & Communications Security, pp. 210-219, (2004)
15.
go back to reference Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues. Comput. Netw. 52(12), 2373–2380 (2008)CrossRef Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues. Comput. Netw. 52(12), 2373–2380 (2008)CrossRef
16.
go back to reference Chien, H.Y.: Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)CrossRef Chien, H.Y.: Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)CrossRef
17.
go back to reference Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distrib. Comput. 69, 848–853 (2009)CrossRef Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distrib. Comput. 69, 848–853 (2009)CrossRef
18.
go back to reference Godor, G., Imre, S.: Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In: IEEE International Conference on Rfid-technologies & Applications, pp. 386-393, (2011) Godor, G., Imre, S.: Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In: IEEE International Conference on Rfid-technologies & Applications, pp. 386-393, (2011)
19.
go back to reference Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133–146 (2014)CrossRef Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133–146 (2014)CrossRef
20.
go back to reference Chien, H.: Y., Elliptic curve cryptography-based RFID authentication resisting active tracking. Wirel. Person. Commun. 94, 2925–2936 (2017) Chien, H.: Y., Elliptic curve cryptography-based RFID authentication resisting active tracking. Wirel. Person. Commun. 94, 2925–2936 (2017)
22.
go back to reference Obana, S.: Almost optimum \(t\)-cheater identifiable secret sharing schemes. In: EUROCRYPT2011, LNCS, vol. 6632, pp. 284–302. (2011) Obana, S.: Almost optimum \(t\)-cheater identifiable secret sharing schemes. In: EUROCRYPT2011, LNCS, vol. 6632, pp. 284–302. (2011)
23.
go back to reference Liu, Y.X.: Efficient \(t\)-cheater identifiable \((k, n)\) secret sharing scheme for \(t\le \lfloor \frac{k-2}{2}\rfloor \). IET Inf. Secur. 8(1), 37–41 (2014)CrossRef Liu, Y.X.: Efficient \(t\)-cheater identifiable \((k, n)\) secret sharing scheme for \(t\le \lfloor \frac{k-2}{2}\rfloor \). IET Inf. Secur. 8(1), 37–41 (2014)CrossRef
24.
go back to reference Menezes, A.J.: Elliptic curve public key cryptosystems. J. Xian Min. Inst. 234, 112–131 (1999) Menezes, A.J.: Elliptic curve public key cryptosystems. J. Xian Min. Inst. 234, 112–131 (1999)
Metadata
Title
Efficient group authentication in RFID using secret sharing scheme
Authors
Yanxiao Liu
Qindong Sun
Yichuan Wang
Lei Zhu
Wenjiang Ji
Publication date
10-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 4/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1929-1

Other articles of this Special Issue 4/2019

Cluster Computing 4/2019 Go to the issue

Premium Partner